An introduction to Cryptography
by Phil Zimmermann
1998
Number of pages: 80
Description:
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.
Download or read it online for free here:
Download link
(0.8MB, PDF)
Similar books
![Book cover: A brief introduction of quantum cryptography for engineers](images/3886.jpg)
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13949 views)
![Book cover: Military Cryptanalysis](images/6116.jpg)
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(17146 views)
![Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial](images/4569.jpg)
by Henk C. A. van Tilborg - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(15477 views)
![Book cover: Cryptography, A Study on Secret Writings](images/243.jpg)
by Andre Langie - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21495 views)